Abstract is missing.
- Physicians' Perspectives in Healthcare Portal DesignPetr Silhavy, Radek Silhavy, Zdenka Prokopova. 1-10 [doi]
- Applied Least Square Regression in Use Case Estimation Precision TuningRadek Silhavy, Petr Silhavy, Zdenka Prokopova. 11-17 [doi]
- Functional and Non-functional Size Measurement with IFPUG FPA and SNAP - Case StudyMiroslaw Ochodek, Batuhan Ozgok. 19-33 [doi]
- A Models Comparison to Estimate Commuting Trips Based on Mobile Phone DataCarlos André R. Pinheiro, Véronique Van Vlasselaer, Bart Baesens, Alexandre G. Evsukoff, Moacyr A. H. B. Silva, Nelson F. F. Ebecken. 35-44 [doi]
- Mobile Learning Systems and OntologySergey Rodzin, Lada Rodzina. 45-54 [doi]
- Synchronization Algorithm for Remote Heterogeneous Database EnvironmentAbdullahi Abubakar Imam, Shuib B. Basri, Rohiza Binti Ahmad. 55-65 [doi]
- Cognitive Framework for Intelligent Traffic Routing in a Multiagent EnvironmentShailendra Tahilyani, Manuj Darbari. 67-76 [doi]
- A Task Management in the Intranet GridPetr Lukasik, Martin Sysel. 77-85 [doi]
- Experiences with DCI PatternIlona Bluemke, Anna Stepien. 87-96 [doi]
- Data Modeling for Precision AgricultureJan Tyrychtr, Václav Vostrovský, Martin Pelikan. 97-106 [doi]
- Organization of Knowledge Management Based on Hybrid Intelligent MethodsLeonid Gladkov, Nadezhda Gladkova, Andrey A. Legebokov. 107-112 [doi]
- Development of Distributed Information Systems: Ontological ApproachV. V. Bova, Y. A. Kravchenko, Vladimir V. Kureichik. 113-122 [doi]
- Decision Support Systems for Knowledge ManagementVladimir V. Kureichik, Y. A. Kravchenko, V. V. Bova. 123-130 [doi]
- Innovation in Services: Implications for Software MaintenanceMircea Prodan, Adriana Prodan, Andreea Ogrezeanu, Anca-Alexandra Purcarea. 131-141 [doi]
- A Comparative Study of Educational Laboratories from Cost & Learning Effectiveness PerspectiveKrishnashree Achuthan, Smitha S. Murali. 143-153 [doi]
- Definition of Attack in Context of High Level Interaction HoneypotsPavol Sokol, Matej Zuzcak, Tomas Sochor. 155-164 [doi]
- Integrating Constraints in Schematics of SystemsSabah Al-Fedaghi. 165-174 [doi]
- S-DILS: Framework for Secured Digital Interaction Learning System Using keccakD. Pratiba, G. Shobha. 175-187 [doi]
- Artificial Immune System Based Web Page ClassificationAytug Onan. 189-199 [doi]
- Ring Algorithms for Scheduling in Grid SystemsA. E. Saak, Vladimir V. Kureichik, E. V. Kuliev. 201-209 [doi]
- The Tomas Bata Regional Hospital Grounds - The Design and Implementation of a 3D VisualizationPavel Pokorný, Petr Macht. 211-222 [doi]
- Secure End-To-End Authentication for Mobile BankingBasudeo Singh, K. S. Jasmine. 223-232 [doi]
- Improving Mutation Testing Process of Python ProgramsAnna Derezinska, Konrad Halas. 233-242 [doi]
- Task Allocation Approaches in Distributed Agile Software Development: A Quasi-systematic ReviewMarum Simão Filho, Plácido Rogério Pinheiro, Adriano Bessa Albuquerque. 243-252 [doi]
- Network Data Analysis Using SparkK. V. Swetha, Shiju Sathyadevan, P. Bilna. 253-259 [doi]
- Optimization of Hadoop Using Software-Internet Wide Area Remote Direct Memory Access Protocol and Unstructured Data AcceleratorV. Vejesh, G. Reshma Nayar, Shiju Sathyadevan. 261-270 [doi]
- Towards Cooperative Cloud Service Brokerage for SLA-driven Selection of Cloud ServicesElarbi Badidi. 271-281 [doi]
- A Framework for Incremental Covering Arrays ConstructionAndrea Calvagna, Emiliano Tramontana. 283-294 [doi]
- Web Service Composition Based on a Multi-agent SystemAnouer Bennajeh, Hela Hachicha. 295-305 [doi]
- Modified Binary FireFly Algorithms with Different Transfer Functions for Solving Set Covering ProblemsBroderick Crawford, Ricardo Soto, Marco Riquelme-Leiva, Cristian Peña, Claudio Torres-Rojas, Franklin Johnson, Fernando Paredes. 307-315 [doi]
- Binarization Methods for Shuffled Frog Leaping Algorithms That Solve Set Covering ProblemsBroderick Crawford, Ricardo Soto, Cristian Peña, Marco Riquelme-Leiva, Claudio Torres-Rojas, Franklin Johnson, Fernando Paredes. 317-326 [doi]
- Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management ModelNeila Rjaibi, Latifa Ben Arfa Rabai. 327-337 [doi]
- Proposal of an Expert System for Predicting Warehouse StockBogdan Walek, Radim Farana. 339-347 [doi]
- A Multiplatform Comparison of a Dynamic Compilation Using Roslyn and Mathematical Parser Libraries in .NET for Expression EvaluationPetr Capek, Erik Kral, Roman Senkerik. 349-358 [doi]
- Value Analysis and Optimization a Machining Process for Hot-Box CoreFlorin Chichernea. 359-370 [doi]
- MASCM: Multi Agent System for Cloud ManagementTamer F. Mabrouk. 371-377 [doi]